Please wait a minute...
Computer & Telecommunication
Current Issue | Archive | Adv Search |
Research on the Intrusion Detection Method Based on Machine LearningAlgorithm
Gansu University of Political Science and Law
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  In recent years, "WannaCry" and other ransomware network security problems have emerged in an endless stream, causing immeasurable damage to the Internet. The network intrusion detection system plays an important role in protecting the computer as an effective second gate to make up the firewall against network threats. This article firstly introduces the definition and research sta- tus of intrusion detection. Secondly, it introduces the machine learning algorithms and their general processes for solving cyberspace security problems. The specific applications of machine learning in intrusion detection are introduced, especially random forest algo- rithm, Bayesian algorithm and other mainstream machine learning algorithms in the progress of intrusion detection; finally, the de- velopment direction of machine learning algorithms in intrusion detection systems is discussed.
Key wordsnetwork intrusion detection      machine learning      random forest      network security     
Published: 10 July 2020

Cite this article:

WANG Yu HE Zhen-xiang. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm. Computer & Telecommunication, 2020, 1(7): 1-3.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2020/V1/I7/1

[1] LIU Hui-fang. Research and Application of Anti-fraud Model Based on Big Data of Communication Operator[J]. 电脑与电信, 2021, 1(7): 46-52.
[2] ZHANG Chun LIU Chao LIU Xv-dong CHEN Zhi-hao JIANG Yong ZHANG Hui ZHOU Hui HU Jian-cun. Consumer Portrait Construction and Potential Consumer Mining Method in Business District[J]. 电脑与电信, 2021, 1(6): 79-86.
[3] ZHUANG Yuan-xiang. Teaching Research on Network Security in Technical Schools[J]. 电脑与电信, 2021, 1(1): 62-67.
[4] JIANG Yi ZHU Jun-wu. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 21-24.
[5] XIE Feng MENG Jin DING Wei REN Zhao-peng . Overview of Network Structure Transformation and Network Security Construction Based on MajorActivities Guarantee[J]. 电脑与电信, 2020, 1(6): 57-62.
[6] ZHONG Yu-ming CHEN Chang-hui. Exploration of Network and Information Security[J]. 电脑与电信, 2020, 1(5): 33-35.
[7] ZHOU Xiao-juan. Discussion on the Computer Network Security and Preventive Measures in the Era of Big Data[J]. 电脑与电信, 2020, 1(3): 41-43.
[8] CAI Chang-hao LU Chang-xing HATe SUN Ruo-xi XIN Yu-liang. Research on User Privacy Protection Method in Logistics Industry[J]. 电脑与电信, 2020, 1(12): 75-79.
[9] ZHANG Yu. Application of DES File Encryption in Network Security[J]. 电脑与电信, 2019, 1(7): 49-.
[10] JIANG Lin-zhou. Man-in-the-middle Attack and Defense Methods in Wireless Networks[J]. 电脑与电信, 2019, 1(5): 48-50.
[11] TONG Lian. Research and Application of Machine Learning in Big Data[J]. 电脑与电信, 2018, 1(9): 29-31.
[12] SONG Tian-shu, LI Jiang-yu, ZHANG Qin-zhe. Research on Personal Microblog Clustering Based on CBOW Model[J]. 电脑与电信, 2018, 1(4): 69-72.
[13] YE Zheng-qiang , LI Jia . Design and Deployment of Enterprise Network Security Scheme[J]. 电脑与电信, 2018, 1(1-2): 53-54.
[14] FAN Miao-miao. Analysis of WSN Network Security Management Mechanism[J]. 电脑与电信, 2018, 1(12): 84-86.
[15] Yao Bing-ying Li Chao Zou Gui-hong. Application Research on Identification of Cervical Lesions Based on Random Forest[J]. 电脑与电信, 2018, 1(11): 15-17.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd